Suspicious Detection System via Triple DES Algorithm: Cryptography Approach
|
|
- Adele Ray
- 5 years ago
- Views:
Transcription
1 Available Online at International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg RESEARCH ARTICLE ISSN X Suspicious Detection System via Triple DES Algorithm: Cryptography Approach Nisha Rani 1 1 Research Scholar, Department of Computer Science and Engineering, Ganga Institute Of Technology & Management, Kablana ID: nishaparnala@gmail.com Mrs. Neetu Sharma 2 2 HOD (CSE Dept.), Ganga Institute Of Technology & Management, Kablana ID: neetush75@gmail.com Abstract: The paper presents a suspicious detection System which detect suspicious activities. In the paper we proposed the use of cryptography strategies for terrorists detection. Security plays a very important and crucial role in the field of Internet and for communication. So there is a need of suspicious detection system which detects all suspicious activities. The need for Suspicious detection System is increasing due to the rapid usage of communication in the Internet world. Triple Data encryption standard (DES) is a private key cryptography system that provides the security in communication system. By using an Enhanced DES algorithm the security has been improved which is very crucial in the communication and field of Internet. Keywords Cipher text, Decryption, 3DES, Encryption, Plaintext. I. INTRODUCTION is one of the most popular, fastest and cheapest means of communication. It has become a part of everyday life for millions of people, changing the way we work and collaborate. messages can be sent to an individual or groups. A single can spread among millions of people within few moments. Nowadays, most individuals even cannot imagine the life without . For those reasons, has become a widely used medium for communication of terrorists as well. A great number of researchers focused in the area of counterterrorism after the disastrous events of 9/11 trying to predict terrorist plans from suspicious communication. This also motivated us to contribute in this area. 2015, IJCSMC All Rights Reserved 552
2 In this paper, we have applied Cryptography techniques to detect suspicious s, i.e., an that alerts of upcoming terrorist events. We have applied Triple DES (Data Encryption Standard) algorithms, emphasizing initially on Given a plaintext message, the first key is used to DES- encrypt the message. The second key is used to DES-decrypt the encrypted message. (Since the second key is not the right key, this decryption just scrambles the data further.) The twice-scrambled message is then encrypted again with the first key to yield the final cipher text. This three-step procedure is called triple-triple-des is just DES done three times with two keys used in a particular order. (Triple-DES can also be done with three separate keys instead of only two. In either case the resultant key space is about 2^112.) Detecting Suspicious and criminal activities prior to the attacks and providing security to the people is the challenging task for the investigators or administrator . is a technology that includes passing and sending information from one place to another, using computer and the Internet. It is beneficial in both our personal and professional life. As Electronic mail is largely used by the terrorists for their communication, there is a need for Suspicious detection system that classifies s to detect Suspicious activities and make the administrator alert. In this paper work, we will detect the suspicious mails sent from the users who are already registered on this System. Firstly new users sign up themselves on the site to send the mails to those users who already registered and then view the messages from the registered users. Triple DES Algorithm used by admin to encrypt the messages sent to the users or sent some warnings about the other users suspicious activity. In this work, suspicious words dictionary is used to detect the suspicious words which are not actually used in the normal messaging or communication. Suspicious Detection System Suspicious detection is a kind of mailing system where suspicious users are identified by determining the keywords used by him/her. The keywords such as bomb, RDX, are found in the mails which are sent by the user. All these blocked mails are checked by the administrator and identify the users who sent such mails. The proposed work will helps in finding out anti social elements. This provides the security to system which adapts it. This also helps the intelligence bureau, crime branch etc.insurance premium calculations, for quarterly, half yearly and annually is completely automated gives us a reliable environment. The system provides claim reporting and status enquiry. The proposed work will be helpful for identifying the suspicious and also assist the investigators to get the information in time to take effective actions to reduce the criminal activities. 2015, IJCSMC All Rights Reserved 553
3 II. RELATED WORK The research in the area of analysis usually focuses on two areas namely: traffic analysis and content analysis. A lot of research has been conducted for traffic analysis [10], [11]. In the Year 2005 Keila and Skillicorn [11] have investigated on the Enron [13] data set which contains communications among employees of an organization who were involved in the collapse of the organization. The authors [11] have applied ID3 algorithm to detect suspicious s by using keyword base approach and by applying rules. They have not used any information regarding the context of the identified keywords in the s. In the Year 2007 S. Appavu & R. Rajaram [2] have applied association rule mining to detect suspicious s with the additional benefits of classifying the (suspicious in terms of terror plots) s further into specialized classes such as suspicious alert or suspicious info. This system decides whether the can be classified as suspicious alert in the presence of suspicious keyword in the future tense otherwise only it is classified as suspicious info. In the Year 2008 The authors [13], [14] incorporated feature selection strategies along with classification systems. According to [15], by using feature selection methods one can improve the accuracy, applicability, and understandability of the learning process. Selvakuberan et al. [14] have applied filtered feature selection methods [16] on web page classification; according to their results the evaluator CfsSubset Eval yields better performance with search methods Best First, Ranker search, and Forward selection. Pineda-Bautista et al. [17] proposed a method for selecting the subset of features for each class in multi-class classification task. The classifiers that were used by the authors were Naïve Baye's (NB) [6], k-nearest Neighbors (k-nn) [17], C4.5 [19], and Multi Layer Perceptron (MLP). The authors trained the classifier for each class separately by using only the features of that particular class. In the Year Smith 2007 [15]have emphasized the use of a feature selection method for achieving accuracy of sentiment classification. They proposed to apply CfsSubset Eval with the Best First search method. Different researcher used different method to implement a System that detect suspicious activities. The Proposed method used cryptography algorithm i.e. triple DES (3 Data Encryption standard) it is very fast algorithm for encrypt or decrypt the information ( message) in a successful rate. 2015, IJCSMC All Rights Reserved 554
4 We will detect the suspicious mails sent from the users who are already registered on this website. Firstly new users sign up themselves on the site to send the mails to those users who already registered and then view the messages from the registered users. Triple DES Algorithm used by admin to encrypt the messages sent to the users or sent some warnings about the other users suspicious activity. In this proposed work, suspicious words dictionary is used to detect the suspicious words which are not actually used in the normal messaging or communication. A. Triple DES Algorithm (3DES) 3DES is an enhancement of DES; it is 64 bit block size with 192 bits key size. In this standard the Encryption method is similar to the one in the original DES but applied 3 times to increase the encryption Level. Triple DES is DES three times. It comes in two flavors: One that uses three keys, and other that uses two keys. The Idea of 3-DES is shown in to the fig.1. The plain text block P is first encrypted with a key K1, then encrypted with second key K2, and finally with third key K3, where K1, K2 and K3 are different from each other. To decrypt the cipher text C and obtain the plain text, we need to perform the operation P= DK3 (DK2 (DK1 )). But in Triple DES with two keys the algorithms works as follows: [1] Encryption the plain text with key K1. Thus, we have EK1 (p). [2] Decrypt the output of step1 above with key K2. Thus, we have DK2 (EK1 (P)). [3] Finally, encrypt the output of step 2 again with key K1.Thus, we have EK1 (DK2 (EK1 (P))). The idea of 3-DES with two keys are shown in fig , IJCSMC All Rights Reserved 555
5 (Triple DES) III. PROBLEM STATEMENT The problem under consideration is to identify s that contain suspicious contents indicating terrorism events. We consider the task of suspicious detection as a System. The purpose is to formulate a System that detects suspicious activities. We cannot deny the importance of that is a major source of communication among most individuals and organizations, including terrorists and terrorist organizations. The proposed system first detect the suspicious activities when suspicious user send some suspicious message to another user and then delete that message which is basically going through , IJCSMC All Rights Reserved 556
6 The is marked as suspicious when certain keywords like bomb, attack, RDX are present in message. These keywords are inserted by Administrator by creating the data dictionary. IV. Study of Cryptography Technique Encryption: The process of encoding the plaintext into cipher text is called Encryption. Decryption: The process of decoding ciphers text to plaintext is called Decryption. This can be done by two techniques symmetric-key cryptography and asymmetric key cryptography. Symmetric key cryptography involves the usage of the same key for encryption and decryption. Asymmetric key cryptography involves the usage of one key for encryption and another, different key for decryption. V. IMPLEMENTATION DETAILS In this research work we have used triple Des algorithm to implement suspicious detection system. We have created two modules for this work. a) Admin Module. b) User Module. 2015, IJCSMC All Rights Reserved 557
7 These modules also carry sub-modules. a) Admin Module: i. Admin Login ii. Check Suspicious Mails for Admin iii. Data Dictionary for Admin iv. View Data Dictionary for Admin v. View User List for Admin vi. Create message Module for Admin b) User Module i. User Login ii. User Registration Module iii. Create Message Module for Users iv. Inbox Module for Users v. Sent Box Module for Users vi. User Forum a) Admin Module: In Admin module, admin can check all the suspicious mail which is send by suspicious users. He can view the data dictionary, see the user detail which is registered in this system as well as send the message to user. i) Admin Login In this module, admin can enter the username and password to authenticate himself to access the account panel modules. ii) Check Suspicious Mails for Admin In this module, admin can check the suspicious mail which is not actually stored into the user inbox instead of marked as suspicious status and sent it to the admin as suspicious mails with the user details. iii) Data Dictionary for Admin In this module, admin can add the suspicious words into existing data dictionary to detect more precisely and accurately the suspicious mails sent by the users. iv) View Data Dictionary for Admin In this module, admin can view the suspicious words exists into the data dictionary and also has access to delete the suspicious words from the existing data dictionary of suspicious words. 2015, IJCSMC All Rights Reserved 558
8 v) View Users List for Admin In this module, admin can view the registered users and their full details and has access to delete the users if any of the registered users are found to do the suspicious activity on the website. vi) Create message Module for admin In this module, admin can select the username and then enter the message along with the subject and also the input encryption key which is used for encrypt the message as well as the subject and then send it to the selected user and message and subject are both stored into the user inbox. b) User Module: In this, user can send message to another user and that message will be encrypt in some way by using some key. When user(sender) send message to another user he has to enter their name, subject, key, and type their message. id is already registered at the time of user registration. Then that key will be send to the user(receiver) gmail inbox. He can see their key and the decrypt their message and see the message. So, the main benefit of this system it provides security as well as suspicious mails and suspicious user can easily identified. Platform To implement a system, we have used Programming Language Advanced Java; NetBeans as a front end IDE, MySQL Server as a database for storing data and supported Operating System are WINDOWS XP & its above versions. SCREENSHOTS Suspicious detection system 2015, IJCSMC All Rights Reserved 559
9 Login module Admin Account Panel Check suspicious s 2015, IJCSMC All Rights Reserved 560
10 Message Panel Create suspicious words User List Module Compose message module for admin 2015, IJCSMC All Rights Reserved 561
11 Show message panel 2015, IJCSMC All Rights Reserved 562
12 User Login Module Registration Module Create message module for user 2015, IJCSMC All Rights Reserved 563
13 Sent box message module for user User Forum Module VI. CONCLUSION The proposed System is solved the problem definition by detecting the suspicious mails. Admin is created the data dictionary of suspicious words and this data dictionary makes help to detect the suspicious activity of the users. Admin further will be added the suspicious words into the existing Suspicious Words data dictionary. References [1] S.Appavu alias Balamurugan, Aravind,Athiappan, Bharathiraja,Muthu Pandian and Dr.R.Rajaram, Association Rule Mining for Suspicious Detection: A Data Mining Approach, in Proc. Of the IEEE International Conference on Intelligence and Security Informatics, New Jersey,USA, 2007, pp [2] P.S.Keila and D.B.Skillicorn, Detecting unusualand Deceptive Communication in , Technical reports June, [3] S.Appavu and R.Rajaram, Suspicious Detection via Decision Tree: A Data Mining Approach, in Journal of Computing and Information Technology CIT 15, 2007,2, pp , IJCSMC All Rights Reserved 564
14 [4] S.Appavu, R.Rajaram, G.Athiapan, M.Muthupandian, Data Mining Techniques for Suspicious Detection: A Comparative Study. Presented in IADIS European Conference DataMining 2007, pp [5]R.Agrawal, R.J.Bayardo and R.Srikant. Athena, Mining-based interactive management of text databases, In Proc. 7thInt. Conf. Extending Database Technology, Konstanz, Germany, 2000, pp [6] R.B.Segal and J.O.Kephart, MailCat: An Intelligent Assistant for Organizing , in the Proc. of 3 rd Int. Conf. on Autonomous Agents. [7] R.Agrawal and R.Srikant, Fast algorithms for mining association rules, In Proc. 20 th Int. Conf. Very Large Databases, pp , Santiago, Chile, [8] Liu, W. Hsu, and Y. Ma, Integrating classification and Data Mining, pages 80-86, New York City, NY, August [9] X. Yin, J. Han, CPAR: Classification based on predictive Association Rules, SDM 03, pages [10] A.A.Zaidan, B.B.Zaidan, Novel Approach for High Secure Data Hidden in MPEG Video Using Public Key Infrastructure, International Journal of Computer and Network Security, 2009, Vol.1, No.1, ISSN: , P.P [11] A.W.Naji, A.A.Zaidan, B.B.Zaidan, Shihab A, Othman O. Khalifa, Novel Approach of Hidden Data in the (Unused Area 2 within EXE File) Using Computation between Cryptography and Steganography, International Journal of Computer Science and Network Security (IJCSNS), Vol.9, No.5, ISSN: , pp [12] Anas Majed Hamid, Miss Laiha Mat Kiah, Hayan.T. Madhloom, B.B Zaidan, A.A Zaidan, Novel Approach for High Secure and High Rate Data Hidden in the Image Using Image Texture Analysis, International Journal of Engineering and Technology (IJET), Published by: Engg Journals Publications, ISSN: , Vol.1,NO.2,P.P [13] K.Selvakuberan, M.Indradevi, R.Rajaram, (2008). Combined feature selection and classification A novel approach for categorization of web pages. Journal of Information and Computing Science. 32pp [14] A. Arauzo-Azofra, J. M. Benitez, Empirical Study of Feature Selection Methods in Classification, In proc. of Eighth Internation Conference on Hybrid Intelligent System s, 2008, pp [15] K. T. Durant, M. D. Smith Predicting t he political sentiment of web log post s using supervised machine learning techniques coupled with feature selecion".lncs, 2007, pp [16]A.A.Zaidan, B.B.Zaidan, Anas Majeed, "High Securing Cover-File of Hidden Data Using Statistical Technique and AES Encryption Algorithm", World Academy of Science Engineering and Technology(WASET), Vol.54, ISSN: , P.P [17] A.A.Zaidan, Fazidah. Othman, B.B.Zaidan, R.Z.Raji, Ahmed.K.Hasan,and A.W.Naji," Securing Cover-File without Limitation of Hidden Data Size Using Computation between Cryptography and Steganography", World Congress on Engineering 2009 (WCE), The2009 International Conference of Computer Science and Engineering, Proceedings of the International Multi Conference of Engineers and Computer Scientists 2009, ISBN: , Vol. I, p.p [18] M.Abomhara, Omar Zakaria, Othman O. Khalifa,A.A.Zaidan, B.B.Zaidan, Enhancing Selective Encryption for H.264/AVC Using Advance Encryption Standard, International Journal of Computer and Electrical Engineering (IJCEE), ISSN: ,Vol.2, NO.2, April2010, Singapore. 2015, IJCSMC All Rights Reserved 565
Overview: Main Fundamentals for Steganography
158 Overview: Main Fundamentals for Steganography Zaidoon Kh. AL-Ani, A.A.Zaidan, B.B.Zaidan and Hamdan.O.Alanazi Abstract The rapid development of multimedia and internet allows for wide distribution
More informationAdvanced Spam Detection Methodology by the Neural Network Classifier
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationRashmi P. Sarode et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 6 (5), 2015,
SMS Encryption Rashmi P. Sarode *, Neeraj Manglani Department of Computer Science Jagan Nath University, Jaipur, India Abstract In the application of Computer Science, the performance of classification
More informationCorrelation Based Feature Selection with Irrelevant Feature Removal
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationImage Encryption Using Arnold s Cat Map and Logistic Map for Secure Transmission
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.194
More informationPERFORMANCE OF CIPHERING AN AUDIO AND VIDEO IN ADHOC NETWORK M. Radha 1, S. Irudhaya Ananthi 2, K. Rani 3
PERFORMANCE OF CIPHERING AN AUDIO AND VIDEO IN ADHOC NETWORK M. Radha 1, S. Irudhaya Ananthi 2, K. Rani 3 1 Dept of Computer Science, Jayaraj Annapackiam College for Women (autonomous), Periyakulam (Taluk),
More informationA New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam Patel 3 Rakesh Patel 4
IJSRD - International Journal for Scientific Research & Development Vol. 2, Issue 08, 2014 ISSN (online): 2321-0613 A New Symmetric Key Algorithm for Modern Cryptography Rupesh Kumar 1 Sanjay Patel 2 Purushottam
More informationA Proposed Cipher Technique with a Study of Existing Cryptography Techniques
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationData Store and Multi-Keyword Search on Encrypted Cloud Data
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,
More informationBit Adjusting Image Steganography in Blue Channel using AES and Secured Hash Function
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationABSTRACT I. INTRODUCTION
2018 IJSRSET Volume 4 Issue 4 Print ISSN: 2395-1990 Online ISSN : 2394-4099 Themed Section : Engineering and Technology An Efficient Search Method over an Encrypted Cloud Data Dipeeka Radke, Nikita Hatwar,
More informationEFFECTIVE INTRUSION DETECTION AND REDUCING SECURITY RISKS IN VIRTUAL NETWORKS (EDSV)
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationSecured Way of Ciphering Text Using Audio Steganography
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationCued Click Point Technique for Graphical Password Authentication
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationII. IMAGE PAGE WITHIN PORTABLE EXECUTABLE FILE
Novel Framework for Hidden Data in the Image Page within Executable File Using Computation between Advanced Encryption Standard and Distortion Techniques A.W. Naji*, Shihab A. Hameed,, B.B.Zaidan**, Wajdi
More informationImplementation of Privacy Mechanism using Curve Fitting Method for Data Publishing in Health Care Domain
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.1105
More informationImproving Latent Fingerprint Matching Performance by Orientation Field Estimation using Localized Dictionaries
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationA Secure Routing Protocol for Wireless Adhoc Network Creation
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 6, June 2014, pg.88
More informationSecure Parallel Processing on Encryption Cloud Data Using Fully Homomorphic Encryption
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationA Hybrid Method of Hiding The Text Information Using Stegnography
A Hybrid Method of Hiding The Text Information Using Stegnography M.Grace Vennice, M.Swapna, MD.Ahmad Ali & T.Dharma Reddy CSE Dept, CMRCET, Hyderabad, India. E-mail : grace_vennice@yahoo.co.in, swapna_manthena2007@yahoo.com
More informationDefenses against Large Scale Online Password Guessing by Using Persuasive Cued Click Points
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 4, April 2013,
More informationNetwork Security Issues and Cryptography
Network Security Issues and Cryptography PriyaTrivedi 1, Sanya Harneja 2 1 Information Technology, Maharishi Dayanand University Farrukhnagar, Gurgaon, Haryana, India 2 Information Technology, Maharishi
More informationSecurity in Voip Network Using Neural Network and Encryption Techniques
2011 International Conference on Information and Network Technology IPCSIT vol.4 (2011) (2011) IACSIT Press, Singapore Security in Voip Network Using Neural Network and Encryption Techniques Ashwini Galande
More informationROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING
ROBUST VIDEO DATA HIDING USING FORBIDDEN ZONE DATA HIDING AND SELECTIVE EMBEDDING ABSTRACT: Video data hiding is still an important research topic due to the design complexities involved. We propose a
More informationInternational Journal of Advance Engineering and Research Development
Scientific Journal of Impact Factor (SJIF): 4.72 e-issn (O): 2348-4470 p-issn (P): 2348-66 International Journal of Advance Engineering and Research Development Volume 4, Issue 5, May-17 Comparaitive Analysis
More informationEnhancing the Efficiency of Radix Sort by Using Clustering Mechanism
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationClassifying Twitter Data in Multiple Classes Based On Sentiment Class Labels
Classifying Twitter Data in Multiple Classes Based On Sentiment Class Labels Richa Jain 1, Namrata Sharma 2 1M.Tech Scholar, Department of CSE, Sushila Devi Bansal College of Engineering, Indore (M.P.),
More informationSECURED ONLINE MATRIMONIAL SYSTEM
Journal homepage: www.mjret.in ISSN:2348 6953 SECURED ONLINE MATRIMONIAL SYSTEM Akshay Baheti, Abhilash Gonpalliwar, Ajay Date, Yuvraj Deokar Department of Computer Engineering Marathwada Mitra Mandals
More informationREMOVAL OF REDUNDANT AND IRRELEVANT DATA FROM TRAINING DATASETS USING SPEEDY FEATURE SELECTION METHOD
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 5.258 IJCSMC,
More informationA Supervised Method for Multi-keyword Web Crawling on Web Forums
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationChallenges of Hidden Data in the Unused Area Two within Executable Files
Journal of Computer Science 5 (11): 890-897, 2009 ISSN 1549-3636 2009 Science Publications Challenges of Hidden Data in the Unused Area Two within Executable Files A.W. Naji, A.A. Zaidan and B.B. Zaidan
More informationA Novel Feature Selection Framework for Automatic Web Page Classification
International Journal of Automation and Computing 9(4), August 2012, 442-448 DOI: 10.1007/s11633-012-0665-x A Novel Feature Selection Framework for Automatic Web Page Classification J. Alamelu Mangai 1
More informationCryptography Functions
Cryptography Functions Lecture 3 1/29/2013 References: Chapter 2-3 Network Security: Private Communication in a Public World, Kaufman, Perlman, Speciner Types of Cryptographic Functions Secret (Symmetric)
More informationAn Effective Performance of Feature Selection with Classification of Data Mining Using SVM Algorithm
Proceedings of the National Conference on Recent Trends in Mathematical Computing NCRTMC 13 427 An Effective Performance of Feature Selection with Classification of Data Mining Using SVM Algorithm A.Veeraswamy
More informationC.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan
Enhancing DES Using Local Languages C.P.Ronald Reagan, S.Selvi, Dr.S.Prasanna Devi, Dr.V.Natarajan Abstract: Network services and internet plays vital role in transmitting information from source to destination.
More informationCombining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating
Combining Review Text Content and Reviewer-Item Rating Matrix to Predict Review Rating Dipak J Kakade, Nilesh P Sable Department of Computer Engineering, JSPM S Imperial College of Engg. And Research,
More informationDesign and Analysis of New Symmetric Block Cipher Algorithm
Design and Analysis of New Symmetric Block Cipher Algorithm KALAICHELVI V && MANIMOZHI K Asst. Professor, SRC- SASTRA University, Kumbakonam, India E-mail: kalaichelvi2k@yahoo.com Abstract Cryptography
More informationDetect Covert Channels in TCP/IP Header using Naive Bayes
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.881
More informationDISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING V. Uma Rani *1, Dr. M. Sreenivasa Rao *2, V. Theresa Vinayasheela *3
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 3 Issue 5 May, 2014 Page No. 5594-5599 DISCLOSURE PROTECTION OF SENSITIVE ATTRIBUTES IN COLLABORATIVE DATA MINING
More informationFUFM-High Utility Itemsets in Transactional Database
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 3, March 2014,
More informationText Classification for Spam Using Naïve Bayesian Classifier
Text Classification for E-mail Spam Using Naïve Bayesian Classifier Priyanka Sao 1, Shilpi Chaubey 2, Sonali Katailiha 3 1,2,3 Assistant ProfessorCSE Dept, Columbia Institute of Engg&Tech, Columbia Institute
More informationExpert System to Detect Suspicious Words in Online Messages for Intelligence Agency Using FP-growth Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 7, July 2015, pg.103
More informationPRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS. SRM University, Kattankulathur, Chennai, IN.
Volume 115 No. 6 2017, 585-589 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu PRIVACY PRESERVING RANKED MULTI KEYWORD SEARCH FOR MULTIPLE DATA OWNERS
More informationIMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING
IMPROVING DATA SECURITY USING ATTRIBUTE BASED BROADCAST ENCRYPTION IN CLOUD COMPUTING 1 K.Kamalakannan, 2 Mrs.Hemlathadhevi Abstract -- Personal health record (PHR) is an patient-centric model of health
More informationSTEGANOGRAPHY: THE ART OF COVERT COMMUNICATION
Journal homepage: www.mjret.in STEGANOGRAPHY: THE ART OF COVERT COMMUNICATION Sudhanshi Sharma 1, Umesh Kumar 2 Computer Engineering, Govt. Mahila Engineering College, Ajmer, India 1 sudhanshisharma91@gmail.com,
More informationMining User - Aware Rare Sequential Topic Pattern in Document Streams
Mining User - Aware Rare Sequential Topic Pattern in Document Streams A.Mary Assistant Professor, Department of Computer Science And Engineering Alpha College Of Engineering, Thirumazhisai, Tamil Nadu,
More informationA New Technique to Optimize User s Browsing Session using Data Mining
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 3, March 2015,
More informationMEMORY EFFICIENT WDR (WAVELET DIFFERENCE REDUCTION) using INVERSE OF ECHELON FORM by EQUATION SOLVING
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC Vol. 3 Issue. 7 July 2014 pg.512
More informationA METHOD TO DETECT PACKET DROP ATTACK IN MANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationISSN Vol.04,Issue.05, May-2016, Pages:
WWW.IJITECH.ORG ISSN 2321-8665 Vol.04,Issue.05, May-2016, Pages:0737-0741 Secure Cloud Storage using Decentralized Access Control with Anonymous Authentication C. S. KIRAN 1, C. SRINIVASA MURTHY 2 1 PG
More informationSecure Token Based Storage System to Preserve the Sensitive Data Using Proxy Re-Encryption Technique
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 2, February 2014,
More informationSecure Encryption Using Armstrong Number,Color Code ASCII and Prime Number
Advances in Wireless and Mobile Communications. ISSN 0973-6972 Volume 10, Number 6 (2017), pp. 1257-1265 Research India Publications http://www.ripublication.com Secure Encryption Using Armstrong Number,Color
More informationAN ENHANCED HIGH LEVEL USER AUTHENTICATION AND DATA SECURITY USING BIOMETRIC INPUT
AN ENHANCED HIGH LEVEL USER AUTHENTICATION AND DATA SECURITY USING BIOMETRIC INPUT P.Kannan*, Karthikeyan.P** School of Information Technology and Engineering, VITUniversity.Vellore pkarthikeyan@vit.ac.in,
More informationEncryption and Forensics/Data Hiding
Encryption and Forensics/Data Hiding 1 Cryptography Background See: http://www.cacr.math.uwaterloo.ca/hac/ For more information 2 Security Objectives Confidentiality (Secrecy): Prevent/Detect/Deter improper
More informationCRYPTOGRAPHY AND NETWORK SECURITY. K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 INTRODUCTION: ABSTRACT:
CRYPTOGRAPHY AND NETWORK SECURITY K. Lakshmi Priya 1, P.Rubha 2,M.Niranjana 3 1 Email:lakshmikpriya3698@gmail.com, 2 Email:rubhapandian@gmail.com, 3 Email:niranjanamurugan@gmail.com, Nadar Saraswathi College
More informationCSCE 813 Internet Security Symmetric Cryptography
CSCE 813 Internet Security Symmetric Cryptography Professor Lisa Luo Fall 2017 Previous Class Essential Internet Security Requirements Confidentiality Integrity Authenticity Availability Accountability
More informationK Anup Kumar et al,int.j.comp.tech.appl,vol 3 (1), 32-39
A Modified Feistel Cipher Involving a Key as a Multiplicant on Both the Sides of the Plaintext Matrix and Supplemented with Mixing, Permutation, and Modular Arithmetic Addition 1 V.U.K. Sastry, 2 K. Anup
More informationFinger Print Enhancement Using Minutiae Based Algorithm
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 8, August 2014,
More informationHybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm
ISSN : 0974 5572 International Science Press Volume 9 Number 40 2016 Hybrid Key Encryption using Cryptography for Wireless Sensor Networks V-Algorithm D. Anitha a S. Aruna a Mathew a K. Mathew a and Devilal
More informationUse of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography
Use of Visual Cryptography and Neural Networks to Enhance Security in Image Steganography K.S.Seethalakshmi (Department of Computer Science and Engineering, RVCE / VTU, INDIA) ABSTRACT : As a result of
More informationDOWNLOAD OR READ : MONTHLY REVIEW OF THE U S BUREAU OF LABOR STATISTICS VOLUME 3 PDF EBOOK EPUB MOBI
DOWNLOAD OR READ : MONTHLY REVIEW OF THE U S BUREAU OF LABOR STATISTICS VOLUME 3 PDF EBOOK EPUB MOBI Page 1 Page 2 monthly review of the u s bureau of labor statistics volume 3 monthly review of the pdf
More informationCryptography MIS
Cryptography MIS-5903 http://community.mis.temple.edu/mis5903sec011s17/ Cryptography History Substitution Monoalphabetic Polyalphabetic (uses multiple alphabets) uses Vigenere Table Scytale cipher (message
More informationT-Alert: Analyzing Terrorism Using Python
T-Alert: Analyzing Terrorism Using Python Neha Mhatre 1, Asmita Chaudhari 2, Prasad Bolye 3, Prof. Linda John 4 1,2,3,4 Department of Information Technology,St. John College Of Engineering and Management.
More informationInternational Journal of Computer Science Trends and Technology (IJCST) Volume 5 Issue 4, Jul Aug 2017
RESEARCH ARTICLE OPEN ACCESS Optimizing Fully Homomorphic Encryption Algorithm using Greedy Approach in Cloud Computing Kirandeep Kaur [1], Jyotsna Sengupta [2] Department of Computer Science Punjabi University,
More informationSanitization Techniques against Personal Information Inference Attack on Social Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationImproved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space
Improved Delegation Of Computation Using Somewhat Homomorphic Encryption To Reduce Storage Space Dhivya.S (PG Scholar) M.E Computer Science and Engineering Institute of Road and Transport Technology Erode,
More informationDisquisition of a Novel Approach to Enhance Security in Data Mining
Disquisition of a Novel Approach to Enhance Security in Data Mining Gurpreet Kaundal 1, Sheveta Vashisht 2 1 Student Lovely Professional University, Phagwara, Pin no. 144402 gurpreetkaundal03@gmail.com
More informationReview on Methods of Selecting Number of Hidden Nodes in Artificial Neural Network
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 11, November 2014,
More informationINTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY
INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.
More informationMULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION
MULTIPLE GRID BASED GRAPHICAL TEXT PASSWORD AUTHENTICATION Vinothini T 1, Rajesh I 2, Kirupa Rani D 3 1 PG Scholar, Dept of CSE, Knowledge Institute of Technology, Salem, Tamil Nadu, India 2 Associate
More informationISSN: (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 3, Issue 5, May 2015 International Journal of Advance Research in Computer Science and Management Studies Research Article / Survey Paper / Case Study Available online at:
More informationISSN: Page 320
A NEW METHOD FOR ENCRYPTION USING FUZZY SET THEORY Dr.S.S.Dhenakaran, M.Sc., M.Phil., Ph.D, Associate Professor Dept of Computer Science & Engg Alagappa University Karaikudi N.Kavinilavu Research Scholar
More informationA Methodology for Assigning Access Control to Public Clouds
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 12, December 2014,
More informationHYBRIDIZED MODEL FOR EFFICIENT MATCHING AND DATA PREDICTION IN INFORMATION RETRIEVAL
International Journal of Mechanical Engineering & Computer Sciences, Vol.1, Issue 1, Jan-Jun, 2017, pp 12-17 HYBRIDIZED MODEL FOR EFFICIENT MATCHING AND DATA PREDICTION IN INFORMATION RETRIEVAL BOMA P.
More informationDesign and Implementation of Search Engine Using Vector Space Model for Personalized Search
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,
More informationA Novel Identification Approach to Encryption Mode of Block Cipher Cheng Tan1, a, Yifu Li 2,b and Shan Yao*2,c
th International Conference on Sensors, Mechatronics and Automation (ICSMA 16) A Novel Approach to Encryption Mode of Block Cheng Tan1, a, Yifu Li 2,b and Shan Yao*2,c 1 Science and Technology on Communication
More informationCCNA Security 1.1 Instructional Resource
CCNA Security 1.1 Instructional Resource Chapter 7 Cryptographic Systems 2012 Cisco and/or its affiliates. All rights reserved. 1 Explain how cryptology consists of cryptography (encoding messages) and
More informationAN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH WORDS
Volume 118 No. 16 2018, 653-666 ISSN: 1311-8080 (printed version); ISSN: 1314-3395 (on-line version) url: http://www.ijpam.eu ijpam.eu AN OPTIMIZED TEXT STEGANOGRAPHY APPROACH USING DIFFERENTLY SPELT ENGLISH
More informationInfraGard User Guide
InfraGard User Guide Table of Contents I. Logging into InfraGard....... pg. 3 II. User Account Functions a. Change Password... pg. 5 b. View and Update Profile Information... pg. 7 c. Update Privacy Settings.
More informationISSN: (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies
ISSN: 2321-7782 (Online) Volume 2, Issue 4, April 2014 International Journal of Advance Research in Computer Science and Management Studies Research Article / Paper / Case Study Available online at: www.ijarcsms.com
More informationCloud security is an evolving sub-domain of computer and. Cloud platform utilizes third-party data centers model. An
Abstract Cloud security is an evolving sub-domain of computer and network security. Cloud platform utilizes third-party data centers model. An example of cloud platform as a service (PaaS) is Heroku. In
More informationA NEW HYBRID APPROACH FOR NETWORK TRAFFIC CLASSIFICATION USING SVM AND NAÏVE BAYES ALGORITHM
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More informationImproving Service Credibility in Password Authentication Peer Service
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 5, May 2014, pg.216
More informationFPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E
FPGA Implementation of Optimized DES Encryption Algorithm on Spartan 3E Amandeep Singh, Manu Bansal Abstract - Data Security is an important parameter for the industries. It can be achieved by Encryption
More informationUsing Data Mining to Determine User-Specific Movie Ratings
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology ISSN 2320 088X IMPACT FACTOR: 6.017 IJCSMC,
More information(2½ hours) Total Marks: 75
(2½ hours) Total Marks: 75 N. B.: (1) All questions are compulsory. (2) Makesuitable assumptions wherever necessary and state the assumptions made. (3) Answers to the same question must be written together.
More informationKeywords APSE: Advanced Preferred Search Engine, Google Android Platform, Search Engine, Click-through data, Location and Content Concepts.
Volume 5, Issue 3, March 2015 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Advanced Preferred
More informationBest Customer Services among the E-Commerce Websites A Predictive Analysis
www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issues 6 June 2016, Page No. 17088-17095 Best Customer Services among the E-Commerce Websites A Predictive
More informationUsing Association Rules for Better Treatment of Missing Values
Using Association Rules for Better Treatment of Missing Values SHARIQ BASHIR, SAAD RAZZAQ, UMER MAQBOOL, SONYA TAHIR, A. RAUF BAIG Department of Computer Science (Machine Intelligence Group) National University
More informationDr. V.U.K.Sastry Professor (CSE Dept), Dean (R&D) SreeNidhi Institute of Science & Technology, SNIST Hyderabad, India
Vol., No., A Block Cipher Involving a Key Bunch Matrix an Additional Key Matrix, Supplemented with Modular Arithmetic Addition supported by Key-based Substitution Dr. V.U.K.Sastry Professor (CSE Dept),
More informationAutomated Survey Analysis System
Automated Survey Analysis System Prof. Arti Bhore 1, Mr V.V. Mane 2, Mr S.B. Poul 3,Mr V.G. Patil 4,Mr S.S. Patil 5 Asst. Professor,Dept. of Computer Engineering, TCOER, Pune, India 1 Student,Dept. of
More informationA hybrid IP Trace Back Scheme Using Integrate Packet logging with hash Table under Fixed Storage
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 2, Issue. 12, December 2013,
More informationAd-hoc Trusted Information Exchange Scheme for Location Privacy in VANET
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 1, January 2015,
More informationSECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC)
SECURITY SYSTEM FOR DATA USING STEGANOGRAPHY AND CRYPTOGRAPHY (SSDSC) Ayman Wazwaz 1, Khalil Abu-haltam 2, Sawan Atawneh 2, Areej Idaes 2, Dalal Salem 2 1 Electrical Engineering Department, Palestine Polytechnic
More informationMost Common Security Threats (cont.)
Most Common Security Threats (cont.) Denial of service (DoS) attack Distributed denial of service (DDoS) attack Insider attacks. Any examples? Poorly designed software What is a zero-day vulnerability?
More informationArm Microcontroller Implementation of Des Using Concept with Time-Variable Key
Arm Microcontroller Implementation of Des Using Concept with Time-Variable Key Amol D. Tupkar 1, Prof. U.A. Rane 2 1 P.G. student (M.E. Digital Electronics), SSGMCE. Shegaon, SGB Amravati University, Maharashtra,
More informationTAMPERPROOF QUESTION PAPERS-AN APPLICATION USING VISUAL CRYPTOGRAPHY SCHEMES
Chapter 5 TAMPERPROOF QUESTION PAPERS-AN APPLICATION USING VISUAL CRYPTOGRAPHY SCHEMES 5.1 Introduction This chapter explains new applications of tamperproof preparation and transmissions of online question
More informationWriter Recognizer for Offline Text Based on SIFT
Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 5, May 2015, pg.1057
More informationImproved Frequent Pattern Mining Algorithm with Indexing
IOSR Journal of Computer Engineering (IOSR-JCE) e-issn: 2278-0661,p-ISSN: 2278-8727, Volume 16, Issue 6, Ver. VII (Nov Dec. 2014), PP 73-78 Improved Frequent Pattern Mining Algorithm with Indexing Prof.
More informationVol. 1, Issue VIII, Sep ISSN
Enhancing the Security of Image Encryption Algorithms by Adding Timestamp Lini Abraham 1, Neenu Daniel 2 1 M.Tech Student (CSE), Mahatma Gandhi University Viswajyothi College of Engineering and Technology,
More information